Now showing items 911-930 of 2594

    • Evaluation of a Cyber Risk Assessment Approach for Cyber–Physical Systems: Maritime- and Energy-Use Cases 

      Amro, Ahmed Walid; Gkioulos, Vasileios (Peer reviewed; Journal article, 2023)
      In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment ...
    • Evaluation of Algorithms for the Determination of Color Gamut Boundaries 

      Bakke, Arne Magnus; Farup, Ivar; Hardeberg, Jon Yngve (Journal article; Peer reviewed, 2010)
      Several techniques for the computation of gamut boundaries have been presented in the past. In this article we take an in-depth look at some of the gamut boundary descriptors used when performing today's gamut mapping ...
    • Evaluation of HTTP/DASH Adaptation Algorithms on Vehicular Networks 

      Vergados, Dimitrios; Michalas, Angelos; Kralevska, Katina; Vergados, Dimitrios D. (Chapter, 2019)
      Video streaming currently accounts for the majority of Internet traffic. One factor that enables video streaming is HTTP Adaptive Streaming (HAS), that allows the users to stream video using a bit rate that closely matches ...
    • Evaluation of K-Means Time Series Clustering Based on Z-Normalization and NP-Free 

      Lee, Ming-Chang; Lin, Jia-Chun; Stolz, Volker (Peer reviewed; Journal article, 2024)
      Despite the widespread use of k-means time series clustering in various domains, there exists a gap in the literature regarding its comprehensive evaluation with different time series preprocessing approaches. This paper ...
    • Evaluation of SDN in Small Wireless-capable and Resource-constrained Devices 

      Beyene, Million Aregawi (Master thesis, 2017)
      Software Defined Networking (SDN) has recently emerged as the promising network architecture paradigm that is believed to revolutionize the networking world by making it more intelligent, flexible and programmable. SDN has ...
    • Evaluations of Cyber Security Education Material for School Students from a Transactional Analysis Perspective 

      Vasrud, Vidar (Master thesis, 2019)
      I 2014 kostet svak informasjonssikkerhet det norske samfunnet 19 milliarder kroner [1]. ID-tyveri, stjeling av bedriftshemmeligheter og løsepengevirus er noen av hendelsene som kan oppstå. Fokuset på informasjonssikkerhet ...
    • Evaluerings- og testkriterier for trådløse datanettverk 

      Vedvik, Rune (Master thesis, 2006)
      Den økte utbredelsen av trådløse datanettverk har ført til en rekke forskjellig trådløst nettverksutstyr på markedet. Det blir produsert utstyr både til hjemmemarkedet og bedriftsmarkedet, og utstyret er tilpasset og ...
    • Event Driven Adaptive Security in Internet of Things 

      Aman, Waqas; Snekkenes, Einar (Chapter, 2014)
      With Internet of Things (IoT), new and improved personal, commercial and social opportunities can be explored and availed. However, with this extended network, the corresponding threat landscape will become more complex ...
    • Evidence in the fog – Triage in fog computing systems 

      Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andre (Journal article; Peer reviewed, 2023)
      Fog computing promises improved service scalability and lower latency for IoT systems. The concept closes the gap between full computing capabilities at the network's edge and cloud systems' centrally located processing ...
    • Evidential Reasoning for Forensic Readiness 

      Liao, Yi-Ching; Langweg, Hanno (Peer reviewed; Journal article, 2016)
      To learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for ...
    • Evolution of the SIM to eSIM 

      Vahidian, Elaheh (Master thesis, 2013)
      Abstract Every GSM (Global System for Mobile Communications) phone, also called 2G mobile phone and every UMTS (Universal Mobile Telecommunications System) phone, aka 3G mobile phone requires a smart card to connect and ...
    • Evolutionary optimization of on-line multilayer perceptron for similarity-based access control 

      Shalaginov, Andrii (Chapter, 2017)
      Neural Networks have been successfully used in different fields of Information Security such that network intrusion detection and malware analysis because of ability to provide high level of abstraction for complex and ...
    • Examining the suitability of industrial safety management approaches for information security incident management 

      Line, Maria Bartnes; Albrechtsen, Eirik (Journal article; Peer reviewed, 2016)
    • Exercise Games for Elderly People: Identifying important aspects, specifying system requirements and designing a concept 

      Wærstad, Mathilde; Omholt, Kine Aasjord (Master thesis, 2013)
      The aim of this study is to identify important aspects of an exergame for elderly, and based on this, specify system requirements and develop a concept for an exergame. Due to "baby boomers" and the fact that people live ...
    • Expanded combinatorial designs as tool to model network slicing in 5G 

      Gligoroski, Danilo; Kralevska, Katina (Journal article; Peer reviewed, 2019)
      The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into ...
    • Expanding the Capabilities of Cyber Range Attack Agents 

      Færøy, Fartein Lemjan (Master thesis, 2022)
      Enheter knyttet til Tingenes Internett (IoT)-domenet er i ferd med å bli en del av vårt daglige liv; fra kroppsmonitorer til kritisk infrastruktur brukes de overalt. Dette gjør dem til ideelle mål for aktører som ønsker å ...
    • Experiences with Linux Mobile 

      Sivertsen, Frode (Master thesis, 2007)
      Mobile phones are becoming more and more complex in terms of both hardware and software. Linux Mobile, as a term covering both the kernel and its surrounding components that together form the operating system, is said to ...
    • Experiencing OptiqueVQS: A Multi-paradigm and Ontology-based Visual Query System for End Users 

      Soylu, Ahmet; Giese, Martin; Jimenez-Ruiz, Ernesto; Vega, Gorgojo Guillermo; Horrocks, Ian (Journal article; Peer reviewed, 2015-04-02)
      Data access in an enterprise setting is a determining factor for value creation processes, such as sense-making, decision-making, and intelligence analysis. Particularly, in an enterprise setting, intuitive data access ...
    • Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging 

      Sørseth, Christian; Zhou, Xianyu Shelley; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2018)
      Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ...
    • Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging 

      Sørseth, Christian; Zhou, Shelley; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2019)
      Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ...